4 top disaster recovery packages compared

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Dec 07, 2016
Featured Image

Hackers wanted

As its ‘bad guy’ stereotype wanes, hacker job postings in the enterprise jump 700% in three years. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

4 top disaster recovery packages compared
29% off World Travel Power Plug Adapter with Dual USB Charger - Deal Alert
Why security leaders need to embrace the concept of reasonable security now
Common security mistakes in collaboration tools
Bridging the CIO and CISO divide
Playing cyber defense is not enough to win
ICYMI: The worst people you meet doing IT security

White Paper: Dyn Inc

Extending Global Load Balancing to the Cloud with Secondary DNS

While most organizations have invested in improving the performance and resiliency of their on-premise Global Load Balancing (GLB) capabilities, very few organizations are able to achieve the level of performance and high availability that a cloud-based anycast DNS network can offer. Read More

Thumbnail Image
INSIDER

4 top disaster recovery packages compared

There’s arguably no more important IT task than making sure business systems and data can be restored after a disaster. So we asked system administrators to identify the best features — and what’s missing — in four leading software suites for disaster recovery. Read More

Thumbnail Image
DealPost

29% off World Travel Power Plug Adapter with Dual USB Charger - Deal Alert

Get 14% off this all-in-one world travel power adapter, plus an additional 15% when you check the "apply coupon" box on Amazon. Built-in sliders let you create the right adapter for any country in the world. Includes dual-USB ports for your portable devices. Read More

Thumbnail Image

Why security leaders need to embrace the concept of reasonable security now

Vanessa Henri explains the legal definition of reasonable security and why now is the time to embrace the concept and prepare Read More

Thumbnail Image

Common security mistakes in collaboration tools

Collaboration tools have become all the rage, but has your IT department closed all security gaps. Read More

Thumbnail Image

Bridging the CIO and CISO divide

Why identity and access management is at the core of the gulf between these two C-suite roles. Read More

Thumbnail Image

Playing cyber defense is not enough to win

Where to draw the line when it comes to offensive cyber attacks Read More

Thumbnail Image

ICYMI: The worst people you meet doing IT security

Now I've collected specific kinds of insecure employees that infosec workers have had to deal with and protect—or protect their servers from. You'll definitely recognize people you work with on this list. Hopefully you won't recognize yourself. Read More

White Paper: Keeper Security

Password Management Evaluation Guide for Businesses

Weak passwords are at the heart of the rise in cyber theft, causing 76% of data breaches. To mitigate this risk, businesses are adopting password management solutions. This is a comprehensive password management evaluation guide with recommended security, implementation and productivity requirements. Read More

Top 5 Stories

1. Website taking donations for the assassination of Donald Trump and Mike Pence
2. Ransomware as a Service fuels explosive growth
3. 2017 security predictions
4. Researchers find a way bypass the iOS activation lock
5. Why cybersecurity companies fail at selling to CISOs... and what to do about it

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.